|Publication number||US7484050 B2|
|Application number||US 10/937,665|
|Publication date||Jan 27, 2009|
|Filing date||Sep 8, 2004|
|Priority date||Sep 8, 2003|
|Also published as||US20050055501|
|Publication number||10937665, 937665, US 7484050 B2, US 7484050B2, US-B2-7484050, US7484050 B2, US7484050B2|
|Inventors||Aloke Guha, Chris T. Santilli|
|Original Assignee||Copan Systems Inc.|
|Export Citation||BiBTeX, EndNote, RefMan|
|Patent Citations (44), Non-Patent Citations (4), Referenced by (6), Classifications (18), Legal Events (8)|
|External Links: USPTO, USPTO Assignment, Espacenet|
This application claims priority to the following application that is hereby incorporated by reference as if set forth in full in this application:
This application is related to the following applications which are hereby incorporated by reference as if set forth in full in this specification:
The present invention relates in general to digital processing and more specifically to a data storage system using hierarchical interconnection.
Typically, in computing devices, data storage systems consist of storage devices such as, hard disk drives, floppy drives, tape drives, compact disks, and the like. An increase in the amount and complexity of these applications has resulted in a proportional increase in the demand for larger storage capacities. Consequently, the production of high capacity storage devices has increased in the past few years. However, these storage devices with large storage capacities also demand high reliability and reasonably high data transfer rates. Moreover, the storage capacity of a single storage device cannot be increased beyond a certain limit. Hence, various data storage system configurations and topologies using multiple storage devices are commonly used to meet the growing demand for increased storage capacity.
A configuration of the data storage system to meet the growing demand involves the use of multiple smaller storage devices. Such a configuration permits redundancy of stored data. Redundancy ensures data integrity in case of device failures. In many such data storage systems, recovery from common failures can be automated within the data storage system itself using data redundancy and parity generation with the help of a central controller. However, such data redundancy schemes may be an overhead to the data storage system. These data storage systems are typically referred to as Redundant Array of Inexpensive/Independent Disks (RAID). The 1988 publication by David A. Patterson, et al., from University of California at Berkeley, titled ‘A Case for Redundant Arrays of Inexpensive Disks (RAID)’, describes the fundamental concepts of the RAID technology.
There are several issues associated with high-capacity storage systems. As the number of drives increases, complexity of logic for switching between drives and the delays involved in parity computation increase exponentially, thereby reducing the system performance in terms of disk input/output. An increase in the number of drives also requires an efficient interconnect scheme for movement of data and control signals between the controller and the drives. Furthermore, disk-based storage systems, having a large number of drives, consume more power than tape based systems of equal storage capacity. This is because tape drives can support a large number of removable cartridges in a single automated library. Therefore, storage on multiple disk drives consumes more power than the equivalent tape drive system. In addition, as the number of powered drives increases, the probability of failure of a disk drive also increases. Therefore, it is desirable that data integrity and disk reliability be maintained.
In a preferred embodiment, a data storage system provides a central controller to manage and control a data storage system. The controller uses a hierarchical interconnect architecture, providing scalability for any number of drives. Data protection schemes such as RAID maintain reliability and data integrity. In addition, the controller can be used in a power-managed workload adaptive environment, improving the performance of the system in terms of power efficiency and input/output.
One embodiment is directed towards a high-capacity data storage system. The data storage system includes at least one data storage unit and a storage controller. Each data storage unit includes storage drives that are arranged in a hierarchical manner. A first tier storage enclosure includes one or more second tier storage enclosures. Each second tier storage controller further includes one or more third tier storage enclosures and so on; the lowest level of storage consisting of individual drives. The storage controller includes a hierarchy of controllers. A first tier controller is connected to one or more second tier controllers. Each second tier controller is connected to one or more third tier controllers and so on. Each controller is connected to the next tier of controllers through switches. In accordance with an embodiment of the present invention, the data storage system also utilizes a data protection scheme. An example of such a scheme is RAID. The data storage system comprises a processor and a memory for implementation of the data protection scheme.
In one embodiment the invention provides an apparatus for coupling a host to a drive in a data storage system, the data storage system comprising a plurality of drives, the apparatus comprising: a first tier controller, the first tier controller receiving a request from the host to couple to the drive; and at least one second tier controller, the second tier controller coupling the drive to the host through the first tier controller.
In another embodiment the invention provides A data storage system, the data storage system receiving requests to store and retrieve data from hosts, the data storage system comprising: one or more data storage units, the data storage units comprising a plurality of drives arranged in a hierarchical manner; and a storage controller, the storage controller coupling a host to a drive requested by the host for a read or a write operation through a hierarchy of storage controllers.
In another embodiment the invention provides A method for coupling a host device to a drive in a data storage system, the data storage system comprising one or more drives, a first tier controller and at least one second tier controller, the method comprising: the first tier controller receiving a request from the host to couple to a drive; identifying a second tier controller associated with the drive; and connecting the host to the drive through the first tier controller and the second tier controller.
Various embodiments of the invention will hereinafter be described in conjunction with the appended drawings provided to illustrate and not to limit the invention, wherein like designations denote like elements, and in which:
A preferred embodiment provides an apparatus and a method for coupling a host to a drive in a data storage system using a hierarchical interconnect, or any other form of coupling. The interconnect comprises several layers of controllers that selectively couple a host to a requested drive through switches.
Hosts 102 can be connected to data storage system 104, using a network or other suitable interconnect means. Data storage system 104 comprises a storage controller 106 and one or more data storage units 108. Each data storage unit 108 further comprises drives 110. The arrangement of drives 110 in data storage unit 108 will be explained in conjunction with
Second tier controller 314 comprises second tier interface 316 and second tier switch 318. Second tier interface 316 is connected to first tier switch 312 and to second tier switch 318. Second tier interface 316 is used to enable communication between first tier controller 302 and second tier controller 314 that may be using different communication methodologies. Examples of such communication methodologies include PCI-X channels, Serial Advanced Technology Attachment (SATA) channels and Fiber Channel interconnects.
In accordance with an embodiment of the invention, storage controller 106 further includes third tier controller 320. Third tier controller 320 selectively connects second tier controller 314 with one or more requested drives 110.
In accordance with an embodiment of the present invention, storage controller 106 also performs data protection functions. Data protection includes prevention of data loss in the event of disk failures. Data protection can be achieved using a RAID redundancy or parity protection. RAID stands for Redundant Array of Inexpensive/independent Drives. Storage controller 106 may provide support for various RAID data organization schemes and combinations. The RAID scheme and various RAID levels are well known in the art and, their use in data protection should be apparent to anyone skilled in the art.
Since data protection schemes like RAID use a redundancy of disks, this leads to an overall increase in power consumption by the storage system. For instance, in RAID 5 scheme, data and parity are written in rotating fashion on multiple drives. Hence, all drives are required to be in power-on state.
In accordance with an embodiment of the invention, data protection may be implemented at first tier controller 302.
In accordance with another embodiment of the invention, data protection is implemented at second tier controller 314.
In accordance with another embodiment of the invention, data protection is implemented at third tier controller 320. Third tier controller 320 comprises a data protection controller. In accordance with an embodiment of the invention, the data protection controller is a RAID controller. The RAID controller further comprises a RAID processor and a memory.
The various steps for connecting a host to a requested drive are discussed below in association with a flowchart shown in
The invention can be used in conjunction with a workload adaptive system of data storage wherein different data organization schemes are provided to handle varying workload profiles. The method has been explained in the co-pending US patent application entitled ‘Method for a Workload Adaptive High performance Storage System with Data Protection’, referenced above. Workload can be characterized by various parameters such as volume size allocated, target Input/Output (I/O) rate, I/O size, and access pattern. Access pattern can include the manner in which the volume is accessed with reference to time. Based on these parameters, performance characteristics such as target storage unit, I/O rate, and RAID configuration are selected for optimal performance.
At step 804, storage controller 106 determines data storage units 108 having a combination of the lowest utilized storage capacity and the least I/O. These data storage units are referred to as target data storage units. At step 806, the target data storage units are checked for sufficient storage and I/O capacity to meet the volume request. If no target data storage unit has sufficient storage capacity and I/O capacity to meet the current volume request, then the available volume is extended by adding in unallocated drives to the volume at step 808.
On determination of the target data storage units, at step 810, storage controller 106 determines an optimal data organization scheme, e.g., RAID or RAIV, which would optimize the I/O performance. In other embodiments, different criteria can be used to direct data organization (or other characteristic) selection. For example, storage use and availability, human design, or other criteria can be used. After choosing a RAID or RAIV format, first tier controller 302 identifies second tier controller(s) 314 associated with the target data storage units at step 812. Second tier controller 314 maps and writes the volume to specific drives 110 in data storage unit 108 at step 814. Once the volume is written, a completion status is sent to host 102 at step 816. The completion status indicates successful completion of the write operation on data storage system 104. This completion status serves as an acknowledgement signifying the completion of the write request.
Communication between the first tier controller 302 and the second tier controller 314 is carried out through specific command sets defined in the second tier controller firmware. In general, any type and format of commands, interface, or communication mechanism can be used between the various tiers in the hierarchy. In accordance with an embodiment of the invention, second tier controller 314 is configured as a single N_port. A standard 64-bit IEEE register identifier is used as an ID for identification purposes. This ID consists of a Network Address Authority number, an IEEE company ID, and a vendor specified identifier.
An exemplary inquiry data format that is used for device identification by second tier controller 314 is shown in a table in
Peripheral Qualifier field is set equal to 00xx (the first two bits of a four-bit hex value are zero), which indicates that there is a physical device on this logical unit, whether connected or not. Peripheral Device Type field is set to zero, which indicates that the device is a magnetic type storage device. RMB field is set to zero, because the medium is not removable. ANSI version field is set to zero, indicating that the controller is in compliance with ANSI SPC-3. Normal Auto Contingent Alliance (NACA) bit is set to zero which indicates that the device server does not support a NACA bit set to one and does not support the NACA standards attribute (see, e.g., SPC-3 at page 142).
HiSup bit is set to zero, indicating that the controller does not use the hierarchical addressing model. Response Data Format field is set to 02h since that controller does not conform to the SCC-2 specification. ACC (Access Controls Coordinator) bit is reset to zero, which indicates that the device contains an access controls coordinator or a CPU at LUN0 and not a disk device. The value in the Asymmetric Logical Units Access (ALUA) field indicates whether or not the logical unit supports asymmetric logical unit access and if so, whether implicit or explicit management is supported. ALUA is assigned a value of 00h. 3PC field is set to zero, indicating that third party copy is not supported. The additional length field specifies the length (in bytes) of the parameters.
If the allocation length is less than the number of data bytes of the parameters, the additional length is not adjusted to reflect the truncation. Basic Queuing bit is set to zero because the controller supports command queuing. Consequently, the CMDQUE bit is set to one. Enclosure Services (ENCSER) bit is set to zero indicating that enclosure service is not supported by the controller. MultiP field is set to zero, which indicates that the controller is not a dual port device. Bytes 8 to 15 are used for vendor identification. This field contains vendor identification data, for instance, the vendor's name encoded in ASCII format. Bytes 16 to 31 are reserved for product identification. These contain the controller model number in a specified format, for instance, 8814-XXXXXXXX or 8818-XXXXXXXX. Bytes 32 to 35 indicate the product revision level. This field contains the ASCII data of the last four digits of the firmware. Bytes 36 to 43 contain the controller serial number. Bytes 44 to 55 are left unused. Bytes 56 to 95 are reserved. The remaining 48 bytes contain the ASCII data of the copyright notice.
Although the invention has been described with reference to specific embodiments thereof, these embodiments are merely illustrative, and not restrictive, of the invention. For example, although a storage system with hierarchical controller has been described in connection with both power management and workflow adaptive features, such features can be used in conjunction with, or separately from, different embodiments. Other embodiments can use a hierarchical controller to advantage with other aspects of a storage system. For example, the hierarchical controller can be used with a system that is part of a SAN network, with RAID, RAIV or other storage formats or configurations, in association with non-hierarchical types of controllers, etc.
Although terms such as “mass storage device,” “disk drive,” etc., are used, any type of storage unit can be adaptable to work with the present invention. For example, disk drives, tape drives, random access memory (RAM), etc., can be used. Different present and future storage technologies can be used such as those created with magnetic, solid-state, optical, bioelectric, nano-engineered, or other techniques. Mass storage devices refer to possible techniques and storage devices for storing large amounts of data and include all types of disk drives and tape drives.
Storage units can be located either internally inside a computer or outside a computer in a separate housing that is connected to the computer. Storage units, controllers, tiers and other components of systems discussed herein can be included at a single location or separated at different locations. Such components can be interconnected by any suitable means such as with networks, communication links or other technology.
Although specific functionality may be discussed as operating at, or residing in or with, specific places and times, in general the functionality can be provided at different locations and times. For example, functionality such as data protection steps can be provided at different tiers of a hierarchical controller. Any type of RAID or RAIV arrangement or configuration can be used.
In the description herein, numerous specific details are provided, such as examples of components and/or methods, to provide a thorough understanding of embodiments of the present invention. One skilled in the relevant art will recognize, however, that an embodiment of the invention can be practiced without one or more of the specific details, or with other apparatus, systems, assemblies, methods, components, materials, parts, and/or the like. In other instances, well-known structures, materials, or operations are not specifically shown or described in detail to avoid obscuring aspects of embodiments of the present invention.
A “processor” or “process” includes any human, hardware and/or software system, mechanism, or component that processes data, signals, or other information. A processor can include a system with a general-purpose central processing unit, multiple processing units, dedicated circuitry for achieving functionality, or other systems. Processing need not be limited to a geographic location, or have temporal limitations. For example, a processor can perform its functions in “real time,” “offline,” in a “batch mode,” etc. Moreover, certain portions of processing can be performed at different times and at different locations, by different (or the same) processing systems.
Reference throughout this specification to “one embodiment”, “an embodiment”, or “a specific embodiment” means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment of the present invention and not necessarily in all embodiments. Thus, respective appearances of the phrases “in one embodiment”, “in an embodiment”, or “in a specific embodiment” in various places throughout this specification are not necessarily referring to the same embodiment. Furthermore, the particular features, structures, or characteristics of any specific embodiment of the present invention may be combined in any suitable manner with one or more other embodiments. It is to be understood that other variations and modifications of the embodiments of the present invention described and illustrated herein are possible in light of the teachings herein and are to be considered as part of the spirit and scope of the present invention.
It will also be appreciated that one or more of the elements depicted in the drawings/figures can also be implemented in a more separated or integrated manner, or even removed or rendered as inoperable in certain cases, as is useful in accordance with a particular application. It is also within the spirit and scope of the present invention to implement a program or code that can be stored in a machine-readable medium to permit a computer to perform any of the methods described above.
Additionally, any signal arrows in the drawings/figures should be considered only as exemplary, and not limiting, unless otherwise specifically noted. Furthermore, the term “or” as used herein is generally intended to mean “and/or”-unless otherwise indicated. Combinations of components or steps will also be considered as being noted, where terminology is foreseen as rendering the ability to separate or combine is unclear.
As used in the description herein and throughout the claims that follow, “a”, “an”, and “the” includes plural references unless the context clearly dictates otherwise. In addition, as used in the description herein and throughout the claims that follow, the meaning of “in” includes “in” and “on” unless the context clearly dictates otherwise.
The foregoing description of illustrated embodiments of the present invention, including what is described in the Abstract, is not intended to be exhaustive or to limit the invention to the precise forms disclosed herein. While specific embodiments of, and examples for, the invention are described herein for illustrative purposes only, various equivalent modifications are possible within the spirit and scope of the present invention, as those skilled in the relevant art will recognize and appreciate. As indicated, these modifications may be made to the present invention in light of the foregoing description of illustrated embodiments of the present invention and are to be included within the spirit and scope of the present invention.
Thus, while the present invention has been described herein with reference to particular embodiments thereof, a latitude of modification, various changes, and substitutions are intended in the foregoing disclosures. It will be appreciated that in some instances some features of embodiments of the invention will be employed without a corresponding use of other features without departing from the scope and spirit of the invention as set forth. Therefore, many modifications may be made to adapt a particular situation or material to the essential scope and spirit of the present invention. It is intended that the invention not be limited to the particular terms used in following claims and/or to the particular embodiment disclosed as the best mode contemplated for carrying out this invention, but that the invention will include any and all embodiments and equivalents falling within the scope of the appended claims.
|Cited Patent||Filing date||Publication date||Applicant||Title|
|US4914656||Jun 28, 1988||Apr 3, 1990||Storage Technology Corporation||Disk drive memory|
|US5088081||Mar 28, 1990||Feb 11, 1992||Prime Computer, Inc.||Method and apparatus for improved disk access|
|US5265098||Aug 3, 1990||Nov 23, 1993||International Business Machines Corporation||Method and means for managing DASD array accesses when operating in degraded mode|
|US5274645||Apr 23, 1992||Dec 28, 1993||Micro Technology, Inc.||Disk array system|
|US5301297||Jul 3, 1991||Apr 5, 1994||Ibm Corp. (International Business Machines Corp.)||Method and means for managing RAID 5 DASD arrays having RAID DASD arrays as logical devices thereof|
|US5479653||Jul 14, 1994||Dec 26, 1995||Dellusa, L.P.||Disk array apparatus and method which supports compound raid configurations and spareless hot sparing|
|US5530658||Dec 7, 1994||Jun 25, 1996||International Business Machines Corporation||System and method for packing heat producing devices in an array to prevent local overheating|
|US5666538||Jun 7, 1995||Sep 9, 1997||Ast Research, Inc.||Disk power manager for network servers|
|US5680579||Jan 25, 1996||Oct 21, 1997||Kaman Aerospace Corporation||Redundant array of solid state memory devices|
|US5787462||Mar 1, 1996||Jul 28, 1998||International Business Machines Corporation||System and method for memory management in an array of heat producing devices to prevent local overheating|
|US5835700||Aug 16, 1996||Nov 10, 1998||Seagate Technology, Inc.||SCSI-coupled module for monitoring and controlling SCSI-coupled raid bank and bank environment|
|US5845319||Aug 21, 1996||Dec 1, 1998||Fujitsu Limited||Disk array device which separates local and physical disks using striping and operation mode selection|
|US5961613||Sep 2, 1997||Oct 5, 1999||Ast Research, Inc.||Disk power manager for network servers|
|US5966510||Dec 29, 1997||Oct 12, 1999||Seagate Technology, Inc.||SCSI-coupled module for monitoring and controlling SCSI-coupled raid bank and bank environment|
|US6098128||Sep 17, 1996||Aug 1, 2000||Cyberstorage Systems Corporation||Universal storage management system|
|US6219753||Jun 4, 1999||Apr 17, 2001||International Business Machines Corporation||Fiber channel topological structure and method including structure and method for raid devices and controllers|
|US6279138||Aug 4, 1998||Aug 21, 2001||International Business Machines Corporation||System for changing the parity structure of a raid array|
|US6363462 *||Jan 15, 1999||Mar 26, 2002||Lsi Logic Corporation||Storage controller providing automatic retention and deletion of synchronous back-up data|
|US6393537 *||Jan 6, 1998||May 21, 2002||International Business Machines Corporation||Host storage management control of outboard data movement|
|US6460122 *||Sep 30, 1999||Oct 1, 2002||International Business Machine Corporation||System, apparatus and method for multi-level cache in a multi-processor/multi-controller environment|
|US6526478||Feb 2, 2000||Feb 25, 2003||Lsi Logic Corporation||Raid LUN creation using proportional disk mapping|
|US6601138||Jun 4, 1999||Jul 29, 2003||International Business Machines Corporation||Apparatus system and method for N-way RAID controller having improved performance and fault tolerance|
|US6763398||Aug 29, 2001||Jul 13, 2004||International Business Machines Corporation||Modular RAID controller|
|US6859865 *||Nov 9, 2001||Feb 22, 2005||Nortel Networks Limited||System and method for removing latency effects in acknowledged data transfers|
|US6951274 *||Jun 6, 2002||Oct 4, 2005||Rapistan Systems Advertising Corp.||Tiered control architecture for material handling|
|US7035972||Jun 26, 2003||Apr 25, 2006||Copan Systems, Inc.||Method and apparatus for power-efficient high-capacity scalable storage system|
|US7076679 *||Oct 6, 2003||Jul 11, 2006||Hewlett-Packard Development Company, L.P.||System and method for synchronizing multiple variable-frequency clock generators|
|US7152142||Oct 23, 2003||Dec 19, 2006||Copan Systems, Inc.||Method for a workload-adaptive high performance storage system with data protection|
|US7210004||Apr 14, 2005||Apr 24, 2007||Copan Systems||Method and system for background processing of data in a storage system|
|US7210005||Feb 9, 2006||Apr 24, 2007||Copan Systems, Inc.||Method and apparatus for power-efficient high-capacity scalable storage system|
|US7219156 *||Aug 24, 2000||May 15, 2007||Silicon Graphics, Inc.||System and method for a hierarchical system management architecture of a highly scalable computing system|
|US7222216||Nov 1, 2006||May 22, 2007||Copan Systems, Inc.||Workload-adaptive storage system with static allocation|
|US20020007464||May 18, 2001||Jan 17, 2002||Amphus, Inc.||Apparatus and method for modular dynamically power managed power supply and cooling system for computer systems, server applications, and other electronic devices|
|US20020062454||May 18, 2001||May 23, 2002||Amphus, Inc.||Dynamic power and workload management for multi-server system|
|US20020144057||Jan 29, 2002||Oct 3, 2002||Data Domain||Archival data storage system and method|
|US20030196126||Apr 11, 2002||Oct 16, 2003||Fung Henry T.||System, method, and architecture for dynamic server power management and dynamic workload management for multi-server environment|
|US20030200473||May 18, 2001||Oct 23, 2003||Amphus, Inc.||System and method for activity or event based dynamic energy conserving server reconfiguration|
|US20030204759||Apr 26, 2002||Oct 30, 2003||Singh Jitendra K.||Managing system power|
|US20030212859||Aug 12, 2002||Nov 13, 2003||Ellis Robert W.||Arrayed data storage architecture with simultaneous command of multiple storage media|
|US20040153740||Aug 26, 2003||Aug 5, 2004||Hitachi, Ltd.||Methods for controlling storage devices controlling apparatuses|
|US20050033455 *||Nov 18, 2003||Feb 10, 2005||Harvey Kasdan||Multi-level controller system|
|US20050177755||May 18, 2001||Aug 11, 2005||Amphus, Inc.||Multi-server and multi-CPU power management system and method|
|US20050210304||Mar 8, 2005||Sep 22, 2005||Copan Systems||Method and apparatus for power-efficient high-capacity scalable storage system|
|US20070220316||Mar 14, 2007||Sep 20, 2007||Copan Systems, Inc.||Method and Apparatus for Power-Efficient High-Capacity Scalable Storage System|
|1||Asaca/Shibasoku Corp of America, publication DM200, 1 page from www.asaca.com/DVL/DM-200.htm, Oct. 7, 2003.|
|2||Chase et al., "Managing Energy and Server Resources in Hosting Centers," Dept of Computer Science, Duke University, pp. 14, Oct. 2001.|
|3||Colarelli et al., The Cas for Massive Arrays of Idle Disks (MAID), Dept of Computer Science, Univ. of Colorado, Boulder, pp. 1-6, Jan. 7, 2002.|
|4||Patterson et al., "A Case for Redundant Arrays of Inexpensive Disks (RAID)," ACM, pp. 109-116, 1998.|
|Citing Patent||Filing date||Publication date||Applicant||Title|
|US8762663||Jun 26, 2012||Jun 24, 2014||International Business Machines Corporation||Transparent input / output switching between synchronously mirrored storage volumes|
|US8782358||Apr 27, 2011||Jul 15, 2014||International Business Machines Corporation||Transparent input / output switching between synchronously mirrored storage volumes|
|US8799594||Apr 27, 2011||Aug 5, 2014||International Business Machines Corporation||Online volume migration using multi-path input/output masquerading|
|US8806157||Jun 26, 2012||Aug 12, 2014||International Business Machines Corporation||Online volume migration using multi-path input / output masquerading|
|US9104323 *||Aug 16, 2008||Aug 11, 2015||International Business Machines Corporation||Apparatus and method for storage cluster control|
|US20090049210 *||Aug 16, 2008||Feb 19, 2009||Eric John Bartlett||Apparatus and method for storage cluster control|
|U.S. Classification||711/154, 711/114, 711/162|
|International Classification||G06F12/04, G06F3/06, G06F12/00|
|Cooperative Classification||G06F3/0613, G06F3/0635, Y02B60/1246, G06F3/0685, G06F3/0625, G06F3/0683, G06F3/0658|
|European Classification||G06F3/06A4T4, G06F3/06A2P4, G06F3/06A6L4, G06F3/06A4C6, G06F3/06A2W|
|Sep 8, 2004||AS||Assignment|
Owner name: COPAN SYSTEMS, INC., COLORADO
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:GUHA, ALOKE;SANTILLI, CHRIS T.;REEL/FRAME:015785/0900
Effective date: 20040908
|Feb 26, 2009||AS||Assignment|
Owner name: WESTBURY INVESTMENT PARTNERS SBIC, LP, NEW YORK
Free format text: SECURITY AGREEMENT;ASSIGNOR:COPAN SYSTEMS, INC.;REEL/FRAME:022309/0579
Effective date: 20090209
|May 7, 2010||AS||Assignment|
Owner name: SILICON GRAPHICS INTERNATIONAL CORP.,CALIFORNIA
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:SILICON VALLEY BANK;REEL/FRAME:024351/0936
Effective date: 20100223
Owner name: SILICON GRAPHICS INTERNATIONAL CORP., CALIFORNIA
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:SILICON VALLEY BANK;REEL/FRAME:024351/0936
Effective date: 20100223
|Jul 27, 2012||FPAY||Fee payment|
Year of fee payment: 4
|Feb 23, 2014||AS||Assignment|
Owner name: SILICON VALLEY BANK, CALIFORNIA
Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:WESTBURY INVESTMENT PARTNERS SBIC, LP;REEL/FRAME:032276/0091
Effective date: 20100223
|Apr 10, 2015||AS||Assignment|
Owner name: RPX CORPORATION, CALIFORNIA
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:SILICON GRAPHICS INTERNATIONAL CORP.;REEL/FRAME:035409/0615
Effective date: 20150327
|Mar 9, 2016||AS||Assignment|
Owner name: JPMORGAN CHASE BANK, N.A., AS COLLATERAL AGENT, IL
Free format text: SECURITY AGREEMENT;ASSIGNORS:RPX CORPORATION;RPX CLEARINGHOUSE LLC;REEL/FRAME:038041/0001
Effective date: 20160226
|Jul 27, 2016||FPAY||Fee payment|
Year of fee payment: 8